FBI, CISA warn hackers abusing buffer overflow CVEs to launch attacks

The agencies are urging manufacturers to shift development practices through the use of memory safe code.
The agencies are urging manufacturers to shift development practices through the use of memory safe code.
Salt Typhoon threat actors compromised Cisco edge devices by exploiting older vulnerabilities.
The president will tap the former RNC insider to lead the White House office that oversees nation’s cybersecurity strategy.
The company, a major U.S. newspaper chain, has been working with forensic specialists to fully restore services and determine the cause.
Cybercriminals maintained access to one victim organization for more than four years.
The software is widely used in projects by local governments, utilities, airports and other facilities.
Russian state-sponsored hackers compromised the tech giant's Office 365 email environment.
SolarWinds, which now will go private, was embroiled in a massive supply chain attack in 2020 linked to Russia-backed threat actors.
An unknown threat actor recently used an exposed key for code injection cyberattacks.
Researchers warn of a surge in attempted logins targeting devices from SonicWall, Palo Alto Networks and others.
Leaders have high hopes for autonomous capabilities, but adding the technology will raise the stakes for security and governance.
The Trump administration is scrutinizing the AI app, Italy and Taiwan have banned it, and companies have blocked it.
Cyberattacks using ransomware spiked in the second half of the year, but fewer victims paid up.
The company agreed to cover expenses related to recovery from the December cyberattack.
Actors linked to North Korea bypassed Apple security using malware called FlexibleFerret.
The deal comes amid a flurry of recent merger and acquisition deals in the cybersecurity sector.
Threat actors are exploiting known weak points and enterprises’ dependency across the tech stack. It’s making cybersecurity professionals’ jobs harder than ever before.
A study from IBM shows the controversial shift to platformization can pay off for enterprises.
Vulnerabilities in certain Contec and Epsimed patient monitors can allow people to gain access and potentially manipulate the devices, the FDA warned.
Burnout seems certain as CISOs confront budget constraints, a heavy workload and job dissatisfaction.